Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30105: CWE-532: Insertion of Sensitive Information into Log File in Dell XtremIO

0
High
VulnerabilityCVE-2025-30105cvecve-2025-30105cwe-532
Published: Wed Jul 30 2025 (07/30/2025, 17:50:38 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: XtremIO

Description

Dell XtremIO, version(s) 6.4.0-22, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:28:19 UTC

Technical Analysis

CVE-2025-30105 is a vulnerability identified in Dell XtremIO storage systems, specifically version 6.4.0-22, classified under CWE-532, which involves the insertion of sensitive information into log files. This vulnerability arises because the system logs sensitive data, such as authentication credentials, in plaintext or insufficiently protected log files accessible to users with low privileges. An attacker with local access but limited privileges can exploit this flaw to retrieve sensitive information from the logs without requiring user interaction. The attacker can then leverage the exposed credentials to escalate privileges and gain unauthorized access to the XtremIO system, potentially compromising the confidentiality, integrity, and availability of the storage environment. The vulnerability has a CVSS v3.1 base score of 8.8, indicating a high severity level, with attack vector local (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), and scope changed (S:C), reflecting the potential for significant impact beyond the initially compromised component. Although no public exploits have been reported yet, the vulnerability poses a serious risk due to the sensitive nature of the information exposed and the critical role of XtremIO in enterprise storage infrastructure. The lack of available patches at the time of reporting necessitates immediate attention to access controls and monitoring to mitigate exploitation risks.

Potential Impact

The impact of CVE-2025-30105 is substantial for organizations relying on Dell XtremIO storage systems. Exposure of sensitive credentials in log files can lead to unauthorized access and privilege escalation within critical storage infrastructure. This compromises data confidentiality, potentially exposing sensitive or regulated information. Integrity is at risk as attackers gaining elevated access could modify or delete data. Availability could also be affected if attackers disrupt storage operations or cause system outages. The vulnerability requires only local access with low privileges and no user interaction, increasing the likelihood of exploitation in environments where multiple users have physical or logical local access. Enterprises with shared or multi-tenant storage environments face heightened risk. The potential for lateral movement within networks and access to critical storage resources makes this vulnerability a significant threat to data center security and business continuity worldwide.

Mitigation Recommendations

To mitigate CVE-2025-30105, organizations should immediately restrict local access to Dell XtremIO systems to trusted personnel only, employing strict access control policies and monitoring. Implement robust logging and alerting mechanisms to detect unusual access to log files or attempts to read sensitive information. Encrypt log files or configure the system to avoid logging sensitive data until a vendor patch is available. Regularly audit user privileges and remove unnecessary local accounts to minimize exposure. Apply vendor-provided patches or updates as soon as they are released to address the vulnerability directly. Consider deploying endpoint detection and response (EDR) solutions on systems with local access to detect exploitation attempts. Additionally, segregate management interfaces and storage systems from general user environments to reduce the attack surface. Conduct security awareness training for administrators and operators on the risks of sensitive data exposure in logs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-03-17T05:03:47.268Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688a5e4dad5a09ad00ad8923

Added to database: 7/30/2025, 6:02:53 PM

Last enriched: 2/27/2026, 1:28:19 AM

Last updated: 3/22/2026, 11:02:00 PM

Views: 117

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses